-
1
-
-
84934219855
-
-
L. Adleman and M. Huang. Recognizing primes in random polynomial time. In Proceedings of the 19th Annual ACM Symposium on the Theory of Computing, pages 462–469, 1987.
-
-
-
-
2
-
-
84934219856
-
-
L. Babai. Trading group theory for randomness. In Proceedings of the 17th Annual ACM Symposium on the Theory of Computing, pages 421–429, 1985.
-
-
-
-
3
-
-
84934219857
-
-
E. Bach. Discrete logarithms and factoring. Technical Report 84/186, Computer Science Division, University of California, June 1984.
-
-
-
-
5
-
-
84934219880
-
-
M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pages 1–10, 1988.
-
-
-
-
9
-
-
84934219881
-
-
G. Brassard and D. Chaum. Personal communication, 1987.
-
-
-
-
11
-
-
84934219878
-
-
G. Brassard and C. Crépeau. Nontransitive transfer of confidence: a perfect zero-knowledge interactive protocol for Sat and beyond. In Proceedings of the 27th IEEE Symposium on the Foundations of Computer Science, pages 188–195, 1986.
-
-
-
-
13
-
-
84934219879
-
-
D. Chaum. Demonstrating that a public predicate can be satisfied without revealing any information about how. In Crypto 86, pages 195–199, 1986.
-
-
-
-
14
-
-
84934219876
-
-
D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pages 11–19, 1988.
-
-
-
-
15
-
-
84934219877
-
-
D. Chaum, I. Damgård, and J. van de Graaf. Multiparty computations ensuring privacy of each party's input and correctness of the result. In Crypto 87, pages 87–119, 1987.
-
-
-
-
16
-
-
84934219884
-
-
D. Chaum, J.-H. Evertse, and J. van de Graaf. An improved protocol for demonstrating possession of a discrete logarithm and some generalizations. In Euro Crypt 87, pages 127–141, 1987.
-
-
-
-
17
-
-
84934219885
-
-
L. Fortnow. The complexity of perfect zero-knowledge. In Proceedings of the 19th Annual ACM Symposium on the Theory of Computing, pages 204–209, 1987.
-
-
-
-
19
-
-
84934219882
-
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In Proceedings of the 27th IEEE Symposium on the Foundations of Computer Science, pages 174–187, 1986.
-
-
-
-
20
-
-
84934219883
-
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. In Proceedings of the 17th Annual ACM Symposium on the Theory of Computing, pages 291–304, 1985.
-
-
-
-
24
-
-
84934219870
-
-
A. Yao. Theory and applications of trapdoor functions. In Proceedings of the 23rd IEEE Symposium on the Foundations of Computer Science, pages 80–91, 1982.
-
-
-
|